Cyber Security AI & Data Privacy Laws: How Businesses Can Stay on the Right Side of Regulation Introduction to AI and Data Privacy Currently, 75% of financial services and the largest law businesses are already using AI technology. So are 68% of large accountancy and consulting businesses. However, as with many valuable technological advancements, unleashing AI potential... Explore Resource
Cyber Security Threat Insight & The Evolving CISO Role Following on from our CISO Predictions released in December, our Director of Cyber Security Sales, James Fernley, shares what is on his mind ahead of 2025. From Insider Threats, to the prevalence of Ransomware, to the evolving role of a... Watch now
Dora Compliance Checklist Prepare for DORA compliance! The enforcement date for DORA regulation is fast approaching – January 17, 2025. Financial institutions across the EU must be prepared for the upcoming changes, using tools like a DORA compliance checklist, as the act seeks to improve the digital resilience of financial entities against cyber threats. Read now
Data & AI Evolving Roles in the Age of AI In this thought-provoking discussion, Darshna, Elastacloud’s Chief AI Officer, sits down with Sandy, Chief Innovation Officer at Elastacloud, to explore how evolving roles in the Age of AI are redefining the C-suite. As titles like Chief AI Officer gain traction,... Watch now
Gated Content The Ultimate Guide to SLA’s & XLA’s An Experience Led Approach is one of the IT industry’s hottest topics – and one we’ve been talking about here at Acora for longer than most. In this guide, we’ve set out some of the background to the XLA, how it differs from and adds to SLA metrics and adoption dimensions of our own Experience Led Approach™, built in by design. Read now
Gated Content Risk vs. Threat: A Strategic Approach The extent to which we understand ourselves—and, more importantly, our adversaries—has become increasingly critical, as cyber threats are no longer a matter of ‘if’ but ‘when.’ This discourse ventures into the realm of cyber security, focusing on the tangible and... Read now
Gated Content Keeping up with endpoint threats Ever-growing cyber threats are a concern for everyone. But for IT leaders, the pressure has been ramped up to a new level. Tackling this can feel overwhelming, but it doesn’t need to be. Let’s go back to basics and start with endpoint protection. Read now
Cyber Security The Identity Shift Identity has become a primary target, with 𝟴𝟮% of data breaches and ransomware attacks being tied to compromised credentials. In today’s hybrid environments, legacy systems and IT infrastructure struggle to support modern security controls such as Multi-Factor Authentication (MFA) and... Listen now